[M.Sc.] Implementing attacks against PUFs

Forumsregeln
Auch ohne Registrierung können Beiträge in diesem Unterforum geschrieben werden.

Antwort erstellen

Bitte gib deine E-Mail-Adresse an, demit du nachträglich Updates zu deinem Post hinzufügen kannst.

Smilies
:D :) :( :o :shock: :? 8) :lol: :x :P :oops: :cry: :evil: :twisted: :roll: :wink: :!: :?: :idea: :arrow: :| :mrgreen:

BBCode ist eingeschaltet
[img] ist eingeschaltet
[flash] ist ausgeschaltet
[url] ist eingeschaltet
Smilies sind eingeschaltet

Die letzten Beiträge des Themas
   

Ansicht erweitern Die letzten Beiträge des Themas: [M.Sc.] Implementing attacks against PUFs

[M.Sc.] Implementing attacks against PUFs

von athanagn » 9. Jan 2015 14:37

The Security Engineering Group (http://www.seceng.de) is looking for a Master student to work towards implementing and testing different attack scenarios on PUFs (Physical Unclonable Functions).

The project

Physical Unclonable Functions (PUFs) are based on characteristics of physical devices that are easy to evaluate, but hard to predict. These characteristics are different between different instances of devices of the same type and may provide unique outputs for the same inputs, resulting in a form of "unclonable" functions. This field is relatively new and highly interesting. Attacks against the integrity, confidentiality or availability of such PUFs have been described in literature, and we would now like to try to test their actual feasibility regarding implementation.

The actual task

We will provide you with different PUF instances and try to define some feasible attack scenarios against them. You are, of course, encouraged to think of more such scenarios on your own, based on the relevant literature. Your main task will be to:
  • improve these scenarios, adopting and refining them to fit the actual situation at hand,
    implement them and try to come up with successful real-life attack scenarios, and
    finally, evaluate and present your results.
Requirements

You need to:
  • have good programming skills in some widely used language (C, C++, Java or Python, etc.) OR in VHDL or Verilog,
    speak English quite fluently,
    be willing to work with Matlab or some other similar program,
    be creative and willing to work towards your goal (within reasonable limits).
We would like you to have:
  • some experience regarding the programming of microcontrollers (FPGAs or any other evaluation boards or embedded systems), or be willing to quickly learn,
    some general broad knowledge on attack scenarios against secure devices,
    a general understanding regarding PUFs (to have at least read this: https://en.wikipedia.org/wiki/Physical_ ... e_function),
    some experience in writing reports and presenting results.
If you're interested in pursuing this project within the friendly and highly innovative environment of our group, or would in general like to know more about it, please contact Nikolaos Athanasios Anagnostopoulos:

Nach oben